Blog - page 7

RSA Bound: Thoughts from a First Timer and Industry Newbie, Part 2

Thoughts from a First Timer and Industry Newbie about RSA 2017. So, how did I spend day one? Well, besides wading through a swarm of vendors, food samples, and similar, I spent the entire day immersed in one hour sessions. Yesterday’s overall theme was Security 101, where various sessions covered security topics for those of us with less than 5 years of experience in the industry.

Read More

Passive Discovery and Exploitation of Open SMB Shares

Server Message Block (SMB) shares are a critical component to most organizations—allowing for a central repository of files and other items that people need to access and share to do their jobs. As a security professional, it is critical that you identify these vulnerabilities within your environment and lock them down.

Read More

User Threat Detection—There’s a Module for That

End-user behavior can be difficult to baseline and monitor. Where traditional analytics and perimeter defenses fall short, LogRhythm’s User and Entity Behavior Analytics (UEBA) capabilities add an additional layer of security enabling the rapid detection of dangerous user activity.

Read More

Cybersecurity Advice for President-Elect Trump: Maintain Bi-Partisan Momentum and Step on the Gas

As Donald Trump prepares to assume the presidency, cybersecurity strategy should be high on his priority list. Timing is of the essence, as those who want to cause harm are not taking a hiatus as our country moves through this massive transition of power. To ensure the safety of our country, our citizens, and the operation of our financial and critical infrastructure, I strongly recommend President-Elect Trump support the Cybersecurity National Action Plan (CNAP) enacted by President Obama in February 2016.

Read More